Zero Trust

Zero Trust | News, how-tos, features, reviews, and videos

Industry 4.0 / Industrial IoT / Smart Factory / robotics / automation
One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

The new cybersecurity mandate

Parsing the White House’s cybersecurity directives.

sdn software defined network architecture

New SDP 2.0 specification facilitates zero-trust maturity

The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.

zero trust security model secured network picture id1313494602 2

8 takeaways for CISOs from the NSTAC zero-trust report

The zero-trust recommendations for federal agencies from the National Security Telecommunications Advisory Committee apply well to the private sector, too.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Forcepoint One combines zero trust and SASE under a single umbrella

Forcepoint introduces a single security platform as an alternative to a best-of-breed approach.

Conceptual image of a network labeled 'Zero Trust.'

OMB issues zero-trust strategy for federal agencies

All federal agencies must meet zero-trust goals that the U.S. Office of Management and Budget has set by 2024, building on earlier federal cybersecurity initiatives.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

iot security startups hot highlights planets rocket lock security

18 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...

currency / money / coins

Cybersecurity spending trends for 2022: Investing in the future

As security budgets continue to rise, where is the money going? Recent surveys offer insight into CISO spending for the year ahead.

high priority gauge

Security priorities for 2022: Advancement, not revolution

Security leaders say their priorities reflect security needs due to recent shifts in their organization’s IT and business environments, a changing threat landscape, and emerging risks.

A person leaps between platforms surrounded by sharks. [danger / risk / challenges]

Enhancing zero trust access through a context-aware security posture

Cybercriminals prefer to attack organizations at sensitive times such as during a merger or earnings release. Adjusting zero-trust policies during those times will help mitigate that risk.

tc burkey hp
video

HP turns to zero trust to defend against emerging threats

CISO Joanna Burkey shares how HP, Inc. leverages a balanced, zero trust model that leans on modern tools and practices and diverse talent.

CSO  >  Right and wrong buttons and question marks

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.

data security / padlock / binary code / digital display

6 ways the pandemic has triggered long-term security changes

With some changes prompted by COVID-19 likely to be permanent, enterprises will need to revise their data security strategies.

basics / building a foundation / how-to / process / steps / stacking blocks

5 steps toward real zero trust security

Looking to advance in your zero trust journey? These steps will keep your strategy on track.

Unitd States cybersecurity   >   U.S. flag with a digital network of locks instead of stars

Federal agencies face new zero-trust cybersecurity requirements

The OMB and CISA issue guidance to move all federal agencies to a shared zero-trust maturity model for FY22-24. The catch: No new funding.

Conceptual image of a network labeled 'Zero Trust.'

7 tenets of zero trust explained

Cut through the hype. NIST's core zero trust elements provide a practical framework around which to build a zero trust architecture.

virtual connections / social networking / remote teams

How long-term hybrid work is changing security strategies

CISOs across industries are revisiting the stopgap security tools and the temporary policies they enacted to quickly enable remote work to replace them with stronger permanent solutions. But the old rules no longer apply.

vcmar burkhardt kris
video

Accenture's journey to zero trust

With more than a half-million employees around the world, Accenture has a long history of supporting employees with technology as they visit clients. Those roots are what informed the organization’s traditional focus on the...

Load More
You Might Also Like